Securing Virtual Machine Images of Cloud by Encryption through Kerberos

被引:0
|
作者
Islam, S. M. Neamul [1 ]
Rahman, Md Mahbubur [2 ]
机构
[1] Bangladesh Univ Profess, Dept Informat & Commun Technol, Dhaka 1216, Bangladesh
[2] Mil Inst Sci & Technol, Dept Comp Sci & Engn, Dhaka 1216, Bangladesh
来源
2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT) | 2017年
关键词
Cloud Computing Security; Virtual Machine Image; Kerberos; Encrypted Storage;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research to ensure the security of virtualized cloud environment. Any compromise of disk images can result in loss of data confidentiality and integrity. There are lots of security threats related to the retrieval and storing of virtual machine (VIM images into cloud storage. Kerberos protocol has been used in many areas for its superior authentication and authorization services. This paper proposes a novel security architecture for the protection of stored virtual machine images in clouds by employing encryption, decryption mechanisms and Kerberos.
引用
收藏
页码:1074 / 1079
页数:6
相关论文
共 13 条
  • [11] Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing
    Han, Yi
    Chan, Jeffrey
    Alpcan, Tansu
    Leckie, Christopher
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (01) : 95 - 108
  • [12] Detecting Anomalies In IaaS Environments Through Virtual Machine Host System Call Analysis
    Alariti, Suaad S.
    Wolthusen, Stephen D.
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 211 - 218
  • [13] Phase Space Detection of Virtual Machine Cyber Events through Hypervisor-level System Call Analysis
    Dawson, Joel
    McDonald, Jeffrey T.
    Hively, Lee
    Andel, Todd R.
    Yampolskiy, Mark
    Hubbard, Charles
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 159 - 167